Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-1087 (GCVE-0-2018-1087)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:51:48.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:1347", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087" }, { "name": "1040862", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040862" }, { "name": "RHSA-2018:1348", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "name": "DSA-4196", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4196" }, { "name": "RHSA-2018:1355", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "name": "RHSA-2018:1345", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "name": "RHSA-2018:1318", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "name": "RHSA-2018:1524", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2018/05/08/5" }, { "name": "104127", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104127" }, { "name": "USN-3641-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3641-2/" }, { "name": "USN-3641-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3641-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "KVM", "vendor": "kernel", "versions": [ { "status": "affected", "version": "kernel 4.16" }, { "status": "affected", "version": "kernel 4.16-rc7" }, { "status": "affected", "version": "kernel 4.17-rc1" }, { "status": "affected", "version": "kernel 4.17-rc2" }, { "status": "affected", "version": "kernel 4.17-rc3" } ] } ], "datePublic": "2018-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "CWE-250", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-29T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2018:1347", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087" }, { "name": "1040862", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040862" }, { "name": "RHSA-2018:1348", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "name": "DSA-4196", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4196" }, { "name": "RHSA-2018:1355", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "name": "RHSA-2018:1345", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "name": "RHSA-2018:1318", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "name": "RHSA-2018:1524", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2018/05/08/5" }, { "name": "104127", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104127" }, { "name": "USN-3641-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3641-2/" }, { "name": "USN-3641-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3641-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "KVM", "version": { "version_data": [ { "version_value": "kernel 4.16" }, { "version_value": "kernel 4.16-rc7" }, { "version_value": "kernel 4.17-rc1" }, { "version_value": "kernel 4.17-rc2" }, { "version_value": "kernel 4.17-rc3" } ] } } ] }, "vendor_name": "kernel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest." } ] }, "impact": { "cvss": [ [ { "vectorString": "8.0/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-250" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:1347", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087" }, { "name": "1040862", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040862" }, { "name": "RHSA-2018:1348", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "name": "DSA-4196", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4196" }, { "name": "RHSA-2018:1355", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "name": "RHSA-2018:1345", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "name": "https://access.redhat.com/security/vulnerabilities/pop_ss", "refsource": "MISC", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "name": "RHSA-2018:1318", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "name": "RHSA-2018:1524", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "name": "http://www.openwall.com/lists/oss-security/2018/05/08/5", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2018/05/08/5" }, { "name": "104127", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104127" }, { "name": "USN-3641-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3641-2/" }, { "name": "USN-3641-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3641-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-1087", "datePublished": "2018-05-15T16:00:00", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-08-05T03:51:48.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-1087\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-05-15T16:29:00.207\",\"lastModified\":\"2024-11-21T03:59:09.197\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.\"},{\"lang\":\"es\",\"value\":\"kernel KVM en versiones anteriores al kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 y kernel 4.17-rc3 es vulnerable a un error en la forma en la que el hipervisor KVM del kernel de Linux gestiona las excepciones lanzadas tras una operaci\u00f3n de cambio de pila mediante instrucciones Mov SS o Pop SS. Durante la operaci\u00f3n de cambio de pila, el procesador no lanz\u00f3 interrupciones y excepciones, sino que las lanza una vez se ha ejecutado la primera instrucci\u00f3n tras el cambio de pila. Un usuario invitado sin privilegios de KVM podr\u00eda usar este error para provocar el cierre inesperado del guest o escalar sus privilegios en el guest.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.1,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-250\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A63F7D1D-EB47-48AE-B89E-E84A63579FA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"01CC5953-3A04-4AA8-B8F9-18BFE5EF7FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C5453A6-E8CE-411F-8B41-669F170FE6D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7126FD36-70E6-4BAA-A0A7-F2A1C380F99A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"22D43572-4406-42D2-812F-79954D31CCC4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6755B6AD-0422-467B-8115-34A60B1D1A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F7E11E-FB34-4467-8919-2B6BEAABF665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DE8FF8A-4285-4D69-9F38-297457A117ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2018/05/08/5\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.securityfocus.com/bid/104127\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040862\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1318\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1345\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1347\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1348\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1355\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1524\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/pop_ss\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://usn.ubuntu.com/3641-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3641-2/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4196\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2018/05/08/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.securityfocus.com/bid/104127\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040862\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1345\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1347\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1348\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1355\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1524\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/pop_ss\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://usn.ubuntu.com/3641-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3641-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4196\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2018:1530-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-92_64 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1069,SUSE-SLE-SERVER-12-SP2-2018-1069", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1530-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1530-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181530-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1530-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:58Z", "generator": { "date": "2018-06-05T15:36:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1530-1", "initial_release_date": "2018-06-05T15:36:58Z", "revision_history": [ { "date": "2018-06-05T15:36:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:58Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:58Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:58Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:58Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1510-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-92_56 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1062,SUSE-SLE-SERVER-12-SP2-2018-1062", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1510-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1510-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181510-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1510-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T14:48:31Z", "generator": { "date": "2018-06-05T14:48:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1510-1", "initial_release_date": "2018-06-05T14:48:31Z", "revision_history": [ { "date": "2018-06-05T14:48:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:31Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:31Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:31Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:31Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1545-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_38 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1066,SUSE-SLE-SERVER-12-SP2-2018-1066", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1545-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1545-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181545-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1545-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:35Z", "generator": { "date": "2018-06-05T15:36:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1545-1", "initial_release_date": "2018-06-05T15:36:35Z", "revision_history": [ { "date": "2018-06-05T15:36:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:35Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:35Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:35Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:35Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1173-2
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to 4.4.121 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability that allowed local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might have allowed local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).\n- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n\nThe following non-security bugs were fixed:\n\n- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).\n- alsa: hda: Add a power_save blacklist (bnc#1012382).\n- alsa: usb-audio: Add a quirck for B\u0026W PX headphones (bnc#1012382).\n- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).\n- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).\n- Partial revert \u0027e1000e: Avoid receiver overrun interrupt bursts\u0027 (bsc#1075428).\n- Revert \u0027e1000e: Separate signaling for link check/link up\u0027 (bsc#1075428).\n- Revert \u0027led: core: Fix brightness setting when setting delay_off=0\u0027 (bnc#1012382).\n- Revert \u0027watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\u0027 This reverts commit 5d4a2355a2a1c2ec6fdf9d18b68ca0a04ff73c70.\n- bpf, x64: implement retpoline for tail call (bnc#1012382).\n- bridge: check brport attr show in brport_show (bnc#1012382).\n- btrfs: Only check first key for committed tree blocks (bsc#1084721).\n- btrfs: Validate child tree block\u0027s level and first key (bsc#1084721).\n- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).\n- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).\n- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).\n- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).\n- dm io: fix duplicate bio completion due to missing ref count (bnc#1012382).\n- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).\n- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).\n- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).\n- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).\n- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).\n- e1000e: Fix link check race condition (bsc#1075428).\n- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).\n- e1000e: Remove Other from EIAC (bsc#1075428).\n- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).\n- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).\n- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).\n- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).\n- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).\n- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).\n- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).\n- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).\n- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).\n- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).\n- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).\n- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).\n- ibmvnic: Fix reset return from closed state (bsc#1084610).\n- ibmvnic: Fix reset scheduler error handling (bsc#1088600).\n- ibmvnic: Handle all login error conditions (bsc#1089198).\n- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).\n- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).\n- ibmvnic: Update TX pool cleaning routine (bsc#1085224).\n- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).\n- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).\n- kGraft: fix small race in reversion code (bsc#1083125).\n- kabi/severities: Ignore kgr_shadow_* kABI changes\n- kvm/x86: fix icebp instruction handling (bnc#1012382).\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).\n- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).\n- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).\n- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).\n- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).\n- media: m88ds3103: do not call a non-initalized function (bnc#1012382).\n- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).\n- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).\n- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).\n- net: fix race on decreasing number of TX queues (bnc#1012382).\n- net: ipv4: avoid unused variable warning for sysctl (git-fixes).\n- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).\n- net: mpls: Pull common label check into helper (bnc#1012382).\n- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).\n- nospec: Allow index argument to have const-qualified type (bnc#1012382).\n- perf/x86/intel: Add model number for Skylake Server to perf (FATE#321269).\n- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).\n- powerpc: Do not send system reset request through the oops path (bsc#1088242).\n- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).\n- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).\n- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).\n- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).\n- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).\n- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).\n- rpm/config.sh: ensure sorted patches.\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).\n- s390/qeth: fix IPA command submission race (bnc#1012382).\n- s390/qeth: fix SETIP command handling (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).\n- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).\n- storvsc: do not schedule work elements during host reset (bsc#1070536, bsc#1057734).\n- storvsc_drv: use embedded work structure for host rescan (bsc#1070536, bsc#1057734).\n- storvsc_drv: use separate workqueue for rescan (bsc#1070536, bsc#1057734).\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).\n- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- udplite: fix partial checksum initialization (bnc#1012382).\n- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\n- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).\n- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).\n- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).\n- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).\n- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).\n- xen-blkfront: fix mq start/stop race (bsc#1085042).\n- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-814", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1173-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1173-2", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1173-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1031717", "url": "https://bugzilla.suse.com/1031717" }, { "category": "self", "summary": "SUSE Bug 1046610", "url": "https://bugzilla.suse.com/1046610" }, { "category": "self", "summary": "SUSE Bug 1057734", "url": "https://bugzilla.suse.com/1057734" }, { "category": "self", "summary": "SUSE Bug 1070536", "url": "https://bugzilla.suse.com/1070536" }, { "category": "self", "summary": "SUSE Bug 1075428", "url": "https://bugzilla.suse.com/1075428" }, { "category": "self", "summary": "SUSE Bug 1076847", "url": "https://bugzilla.suse.com/1076847" }, { "category": "self", "summary": "SUSE Bug 1077560", "url": "https://bugzilla.suse.com/1077560" }, { "category": "self", "summary": "SUSE Bug 1082153", "url": "https://bugzilla.suse.com/1082153" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1083745", "url": "https://bugzilla.suse.com/1083745" }, { "category": "self", "summary": "SUSE Bug 1083836", "url": "https://bugzilla.suse.com/1083836" }, { "category": "self", "summary": "SUSE Bug 1084353", "url": "https://bugzilla.suse.com/1084353" }, { "category": "self", "summary": "SUSE Bug 1084610", "url": "https://bugzilla.suse.com/1084610" }, { "category": "self", "summary": "SUSE Bug 1084721", "url": "https://bugzilla.suse.com/1084721" }, { "category": "self", "summary": "SUSE Bug 1084829", "url": "https://bugzilla.suse.com/1084829" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085185", "url": "https://bugzilla.suse.com/1085185" }, { "category": "self", "summary": "SUSE Bug 1085224", "url": "https://bugzilla.suse.com/1085224" }, { "category": "self", "summary": "SUSE Bug 1085402", "url": "https://bugzilla.suse.com/1085402" }, { "category": "self", "summary": "SUSE Bug 1085404", "url": "https://bugzilla.suse.com/1085404" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1086194", "url": "https://bugzilla.suse.com/1086194" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1087845", "url": "https://bugzilla.suse.com/1087845" }, { "category": "self", "summary": "SUSE Bug 1088241", "url": "https://bugzilla.suse.com/1088241" }, { "category": "self", "summary": "SUSE Bug 1088242", "url": "https://bugzilla.suse.com/1088242" }, { "category": "self", "summary": "SUSE Bug 1088600", "url": "https://bugzilla.suse.com/1088600" }, { "category": "self", "summary": "SUSE Bug 1088684", "url": "https://bugzilla.suse.com/1088684" }, { "category": "self", "summary": "SUSE Bug 1089198", "url": "https://bugzilla.suse.com/1089198" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18257 page", "url": "https://www.suse.com/security/cve/CVE-2017-18257/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7740 page", "url": "https://www.suse.com/security/cve/CVE-2018-7740/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-10-18T12:44:34Z", "generator": { "date": "2018-10-18T12:44:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1173-2", "initial_release_date": "2018-10-18T12:44:34Z", "revision_history": [ { "date": "2018-10-18T12:44:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.73.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.73.1.noarch", "product_id": "kernel-devel-4.4.121-92.73.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.73.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.73.1.noarch", "product_id": "kernel-macros-4.4.121-92.73.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.73.1.noarch", "product": { "name": "kernel-source-4.4.121-92.73.1.noarch", "product_id": "kernel-source-4.4.121-92.73.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.73.1.x86_64", "product_id": "kernel-syms-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18257", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18257" } ], "notes": [ { "category": "general", "text": "The __get_data_block function in fs/f2fs/data.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18257", "url": "https://www.suse.com/security/cve/CVE-2017-18257" }, { "category": "external", "summary": "SUSE Bug 1088241 for CVE-2017-18257", "url": "https://bugzilla.suse.com/1088241" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "moderate" } ], "title": "CVE-2017-18257" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-7740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7740" } ], "notes": [ { "category": "general", "text": "The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7740", "url": "https://www.suse.com/security/cve/CVE-2018-7740" }, { "category": "external", "summary": "SUSE Bug 1084353 for CVE-2018-7740", "url": "https://bugzilla.suse.com/1084353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "moderate" } ], "title": "CVE-2018-7740" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1522-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.59-92_20 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1070,SUSE-SLE-SERVER-12-SP2-2018-1070", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1522-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1522-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181522-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1522-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:37:06Z", "generator": { "date": "2018-06-05T15:37:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1522-1", "initial_release_date": "2018-06-05T15:37:06Z", "revision_history": [ { "date": "2018-06-05T15:37:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "product_id": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:06Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:06Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:06Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:06Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1536-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.59-92_24 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1071,SUSE-SLE-SERVER-12-SP2-2018-1071", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1536-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1536-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181536-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1536-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:37:15Z", "generator": { "date": "2018-06-05T15:37:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1536-1", "initial_release_date": "2018-06-05T15:37:15Z", "revision_history": [ { "date": "2018-06-05T15:37:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "product_id": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:15Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:15Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:15Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:15Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1524-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_32 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1064,SUSE-SLE-SERVER-12-SP2-2018-1064", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1524-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1524-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181524-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1524-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:20Z", "generator": { "date": "2018-06-05T15:36:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1524-1", "initial_release_date": "2018-06-05T15:36:20Z", "revision_history": [ { "date": "2018-06-05T15:36:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:20Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:20Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:20Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:20Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1511-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-92_67 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1068,SUSE-SLE-SERVER-12-SP2-2018-1068", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1511-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1511-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181511-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1511-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:50Z", "generator": { "date": "2018-06-05T15:36:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1511-1", "initial_release_date": "2018-06-05T15:36:50Z", "revision_history": [ { "date": "2018-06-05T15:36:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:50Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:50Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:50Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:50Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1523-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.120-92_70 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1059,SUSE-SLE-SERVER-12-SP2-2018-1059", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1523-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1523-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181523-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1523-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T14:48:08Z", "generator": { "date": "2018-06-05T14:48:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1523-1", "initial_release_date": "2018-06-05T14:48:08Z", "revision_history": [ { "date": "2018-06-05T14:48:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:08Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:08Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:08Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1643-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.82-6_3 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1101", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1643-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1643-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181643-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1643-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:35:49Z", "generator": { "date": "2018-06-11T08:35:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1643-1", "initial_release_date": "2018-06-11T08:35:49Z", "revision_history": [ { "date": "2018-06-11T08:35:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:35:49Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:35:49Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:35:49Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:35:49Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1642-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.82-6_6 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1103", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1642-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1642-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181642-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1642-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:36:49Z", "generator": { "date": "2018-06-11T08:36:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1642-1", "initial_release_date": "2018-06-11T08:36:49Z", "revision_history": [ { "date": "2018-06-11T08:36:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:49Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:49Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:49Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:49Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1518-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-92_53 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1063,SUSE-SLE-SERVER-12-SP2-2018-1063", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1518-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1518-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181518-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1518-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T14:48:40Z", "generator": { "date": "2018-06-05T14:48:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1518-1", "initial_release_date": "2018-06-05T14:48:40Z", "revision_history": [ { "date": "2018-06-05T14:48:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:40Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:40Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:40Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:40Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1516-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.90-92_50 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1060,SUSE-SLE-SERVER-12-SP2-2018-1060", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1516-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1516-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181516-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1516-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T14:48:16Z", "generator": { "date": "2018-06-05T14:48:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1516-1", "initial_release_date": "2018-06-05T14:48:16Z", "revision_history": [ { "date": "2018-06-05T14:48:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:16Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:16Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:16Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:16Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1644-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-94_11 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1109", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1644-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1644-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181644-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1644-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:39:58Z", "generator": { "date": "2018-06-11T08:39:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1644-1", "initial_release_date": "2018-06-11T08:39:58Z", "revision_history": [ { "date": "2018-06-11T08:39:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:58Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:58Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:58Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:58Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1637-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.92-6_30 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1105", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1637-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1637-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181637-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1637-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:37:51Z", "generator": { "date": "2018-06-11T08:37:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1637-1", "initial_release_date": "2018-06-11T08:37:51Z", "revision_history": [ { "date": "2018-06-11T08:37:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "product_id": "kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:51Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:51Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:51Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:51Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1173-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to 4.4.121 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability that allowed local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might have allowed local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).\n- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n\nThe following non-security bugs were fixed:\n\n- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).\n- alsa: hda: Add a power_save blacklist (bnc#1012382).\n- alsa: usb-audio: Add a quirck for B\u0026W PX headphones (bnc#1012382).\n- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).\n- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).\n- Partial revert \u0027e1000e: Avoid receiver overrun interrupt bursts\u0027 (bsc#1075428).\n- Revert \u0027e1000e: Separate signaling for link check/link up\u0027 (bsc#1075428).\n- Revert \u0027led: core: Fix brightness setting when setting delay_off=0\u0027 (bnc#1012382).\n- Revert \u0027watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\u0027 This reverts commit 5d4a2355a2a1c2ec6fdf9d18b68ca0a04ff73c70.\n- bpf, x64: implement retpoline for tail call (bnc#1012382).\n- bridge: check brport attr show in brport_show (bnc#1012382).\n- btrfs: Only check first key for committed tree blocks (bsc#1084721).\n- btrfs: Validate child tree block\u0027s level and first key (bsc#1084721).\n- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).\n- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).\n- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).\n- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).\n- dm io: fix duplicate bio completion due to missing ref count (bnc#1012382).\n- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).\n- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).\n- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).\n- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).\n- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).\n- e1000e: Fix link check race condition (bsc#1075428).\n- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).\n- e1000e: Remove Other from EIAC (bsc#1075428).\n- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).\n- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).\n- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).\n- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).\n- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).\n- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).\n- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).\n- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).\n- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).\n- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).\n- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).\n- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).\n- ibmvnic: Fix reset return from closed state (bsc#1084610).\n- ibmvnic: Fix reset scheduler error handling (bsc#1088600).\n- ibmvnic: Handle all login error conditions (bsc#1089198).\n- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).\n- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).\n- ibmvnic: Update TX pool cleaning routine (bsc#1085224).\n- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).\n- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).\n- kGraft: fix small race in reversion code (bsc#1083125).\n- kabi/severities: Ignore kgr_shadow_* kABI changes\n- kvm/x86: fix icebp instruction handling (bnc#1012382).\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).\n- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).\n- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).\n- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).\n- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).\n- media: m88ds3103: do not call a non-initalized function (bnc#1012382).\n- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).\n- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).\n- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).\n- net: fix race on decreasing number of TX queues (bnc#1012382).\n- net: ipv4: avoid unused variable warning for sysctl (git-fixes).\n- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).\n- net: mpls: Pull common label check into helper (bnc#1012382).\n- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).\n- nospec: Allow index argument to have const-qualified type (bnc#1012382).\n- perf/x86/intel: Add model number for Skylake Server to perf (FATE#321269).\n- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).\n- powerpc: Do not send system reset request through the oops path (bsc#1088242).\n- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).\n- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).\n- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).\n- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).\n- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).\n- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).\n- rpm/config.sh: ensure sorted patches.\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).\n- s390/qeth: fix IPA command submission race (bnc#1012382).\n- s390/qeth: fix SETIP command handling (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).\n- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).\n- storvsc: do not schedule work elements during host reset (bsc#1070536, bsc#1057734).\n- storvsc_drv: use embedded work structure for host rescan (bsc#1070536, bsc#1057734).\n- storvsc_drv: use separate workqueue for rescan (bsc#1070536, bsc#1057734).\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).\n- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- udplite: fix partial checksum initialization (bnc#1012382).\n- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\n- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).\n- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).\n- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).\n- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).\n- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).\n- xen-blkfront: fix mq start/stop race (bsc#1085042).\n- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-7-2018-814,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-814,SUSE-SLE-SAP-12-SP2-2018-814,SUSE-SLE-SERVER-12-SP2-2018-814,SUSE-Storage-4-2018-814", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1173-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1173-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1173-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003979.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1031717", "url": "https://bugzilla.suse.com/1031717" }, { "category": "self", "summary": "SUSE Bug 1046610", "url": "https://bugzilla.suse.com/1046610" }, { "category": "self", "summary": "SUSE Bug 1057734", "url": "https://bugzilla.suse.com/1057734" }, { "category": "self", "summary": "SUSE Bug 1070536", "url": "https://bugzilla.suse.com/1070536" }, { "category": "self", "summary": "SUSE Bug 1075428", "url": "https://bugzilla.suse.com/1075428" }, { "category": "self", "summary": "SUSE Bug 1076847", "url": "https://bugzilla.suse.com/1076847" }, { "category": "self", "summary": "SUSE Bug 1077560", "url": "https://bugzilla.suse.com/1077560" }, { "category": "self", "summary": "SUSE Bug 1082153", "url": "https://bugzilla.suse.com/1082153" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1083745", "url": "https://bugzilla.suse.com/1083745" }, { "category": "self", "summary": "SUSE Bug 1083836", "url": "https://bugzilla.suse.com/1083836" }, { "category": "self", "summary": "SUSE Bug 1084353", "url": "https://bugzilla.suse.com/1084353" }, { "category": "self", "summary": "SUSE Bug 1084610", "url": "https://bugzilla.suse.com/1084610" }, { "category": "self", "summary": "SUSE Bug 1084721", "url": "https://bugzilla.suse.com/1084721" }, { "category": "self", "summary": "SUSE Bug 1084829", "url": "https://bugzilla.suse.com/1084829" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085185", "url": "https://bugzilla.suse.com/1085185" }, { "category": "self", "summary": "SUSE Bug 1085224", "url": "https://bugzilla.suse.com/1085224" }, { "category": "self", "summary": "SUSE Bug 1085402", "url": "https://bugzilla.suse.com/1085402" }, { "category": "self", "summary": "SUSE Bug 1085404", "url": "https://bugzilla.suse.com/1085404" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1086194", "url": "https://bugzilla.suse.com/1086194" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1087845", "url": "https://bugzilla.suse.com/1087845" }, { "category": "self", "summary": "SUSE Bug 1088241", "url": "https://bugzilla.suse.com/1088241" }, { "category": "self", "summary": "SUSE Bug 1088242", "url": "https://bugzilla.suse.com/1088242" }, { "category": "self", "summary": "SUSE Bug 1088600", "url": "https://bugzilla.suse.com/1088600" }, { "category": "self", "summary": "SUSE Bug 1088684", "url": "https://bugzilla.suse.com/1088684" }, { "category": "self", "summary": "SUSE Bug 1089198", "url": "https://bugzilla.suse.com/1089198" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18257 page", "url": "https://www.suse.com/security/cve/CVE-2017-18257/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7740 page", "url": "https://www.suse.com/security/cve/CVE-2018-7740/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-08T17:34:59Z", "generator": { "date": "2018-05-08T17:34:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1173-1", "initial_release_date": "2018-05-08T17:34:59Z", "revision_history": [ { "date": "2018-05-08T17:34:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.73.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.73.1.noarch", "product_id": "kernel-devel-4.4.121-92.73.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.73.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.73.1.noarch", "product_id": "kernel-macros-4.4.121-92.73.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.73.1.noarch", "product": { "name": "kernel-source-4.4.121-92.73.1.noarch", "product_id": "kernel-source-4.4.121-92.73.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.73.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.73.1.ppc64le", "product_id": "kernel-default-4.4.121-92.73.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.73.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.73.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.73.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.73.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.73.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.73.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.73.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.73.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.73.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.73.1.s390x", "product": { "name": "kernel-default-4.4.121-92.73.1.s390x", "product_id": "kernel-default-4.4.121-92.73.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.73.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.73.1.s390x", "product_id": "kernel-default-base-4.4.121-92.73.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.73.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.73.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.73.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.73.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.73.1.s390x", "product_id": "kernel-default-man-4.4.121-92.73.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.73.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.73.1.s390x", "product_id": "kernel-syms-4.4.121-92.73.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.73.1.x86_64", "product_id": "kernel-syms-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.73.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.73.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.73.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.73.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.73.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.73.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.73.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.73.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18257", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18257" } ], "notes": [ { "category": "general", "text": "The __get_data_block function in fs/f2fs/data.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18257", "url": "https://www.suse.com/security/cve/CVE-2017-18257" }, { "category": "external", "summary": "SUSE Bug 1088241 for CVE-2017-18257", "url": "https://bugzilla.suse.com/1088241" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "moderate" } ], "title": "CVE-2017-18257" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-7740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7740" } ], "notes": [ { "category": "general", "text": "The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7740", "url": "https://www.suse.com/security/cve/CVE-2018-7740" }, { "category": "external", "summary": "SUSE Bug 1084353 for CVE-2018-7740", "url": "https://bugzilla.suse.com/1084353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "moderate" } ], "title": "CVE-2018-7740" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1639-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-94_14 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1108", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1639-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1639-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181639-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1639-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:39:26Z", "generator": { "date": "2018-06-11T08:39:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1639-1", "initial_release_date": "2018-06-11T08:39:26Z", "revision_history": [ { "date": "2018-06-11T08:39:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:26Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:26Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:26Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:26Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1636-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.120-94_17 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1110", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1636-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1636-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181636-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1636-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:40:31Z", "generator": { "date": "2018-06-11T08:40:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1636-1", "initial_release_date": "2018-06-11T08:40:31Z", "revision_history": [ { "date": "2018-06-11T08:40:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:40:31Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:40:31Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:40:31Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1641-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.82-6_9 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1102", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1641-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1641-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181641-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1641-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:36:19Z", "generator": { "date": "2018-06-11T08:36:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1641-1", "initial_release_date": "2018-06-11T08:36:19Z", "revision_history": [ { "date": "2018-06-11T08:36:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:19Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:19Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:19Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:19Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1648-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.90-6_12 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1104", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1648-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1648-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181648-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1648-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:37:19Z", "generator": { "date": "2018-06-11T08:37:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1648-1", "initial_release_date": "2018-06-11T08:37:19Z", "revision_history": [ { "date": "2018-06-11T08:37:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:19Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:19Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:19Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:19Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1172-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536 1087209).\n- CVE-2018-7566: A Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user was fixed (bnc#1083483).\n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).\n- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).\n- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).\n- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).\n- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).\n- CVE-2018-6927: The futex_requeue function in kernel/futex.c might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).\n- CVE-2017-16914: The \u0027stub_send_ret_submit()\u0027 function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).\n- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).\n- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).\n- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).\n- CVE-2017-16912: The \u0027get_pipe()\u0027 function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).\n- CVE-2017-16913: The \u0027stub_recv_cmd_submit()\u0027 function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).\n\nThe following non-security bugs were fixed:\n\n- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.\n- KABI: x86/kaiser: properly align trampoline stack.\n- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).\n- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).\n- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).\n- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).\n- kvm/x86: fix icebp instruction handling (bsc#1087088).\n- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).\n- x86-64: Move the \u0027user\u0027 vsyscall segment out of the data segment (bsc#1082424).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/kaiser: properly align trampoline stack (bsc#1087260).\n- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).\n- xfs: check for buffer errors before waiting (bsc#1052943).\n- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-kernel-source-20180429-13591,slessp3-kernel-source-20180429-13591,slexsp3-kernel-source-20180429-13591", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1172-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1172-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181172-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1172-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" }, { "category": "self", "summary": "SUSE Bug 1010470", "url": "https://bugzilla.suse.com/1010470" }, { "category": "self", "summary": "SUSE Bug 1039348", "url": "https://bugzilla.suse.com/1039348" }, { "category": "self", "summary": "SUSE Bug 1052943", "url": "https://bugzilla.suse.com/1052943" }, { "category": "self", "summary": "SUSE Bug 1062568", "url": "https://bugzilla.suse.com/1062568" }, { "category": "self", "summary": "SUSE Bug 1062840", "url": "https://bugzilla.suse.com/1062840" }, { "category": "self", "summary": "SUSE Bug 1063416", "url": "https://bugzilla.suse.com/1063416" }, { "category": "self", "summary": "SUSE Bug 1067118", "url": "https://bugzilla.suse.com/1067118" }, { "category": "self", "summary": "SUSE Bug 1072689", "url": "https://bugzilla.suse.com/1072689" }, { "category": "self", "summary": "SUSE Bug 1072865", "url": "https://bugzilla.suse.com/1072865" }, { "category": "self", "summary": "SUSE Bug 1078669", "url": "https://bugzilla.suse.com/1078669" }, { "category": "self", "summary": "SUSE Bug 1078672", "url": "https://bugzilla.suse.com/1078672" }, { "category": "self", "summary": "SUSE Bug 1078673", "url": "https://bugzilla.suse.com/1078673" }, { "category": "self", "summary": "SUSE Bug 1078674", "url": "https://bugzilla.suse.com/1078674" }, { "category": "self", "summary": "SUSE Bug 1080464", "url": "https://bugzilla.suse.com/1080464" }, { "category": "self", "summary": "SUSE Bug 1080757", "url": "https://bugzilla.suse.com/1080757" }, { "category": "self", "summary": "SUSE Bug 1082424", "url": "https://bugzilla.suse.com/1082424" }, { "category": "self", "summary": "SUSE Bug 1083242", "url": "https://bugzilla.suse.com/1083242" }, { "category": "self", "summary": "SUSE Bug 1083483", "url": "https://bugzilla.suse.com/1083483" }, { "category": "self", "summary": "SUSE Bug 1083494", "url": "https://bugzilla.suse.com/1083494" }, { "category": "self", "summary": "SUSE Bug 1084536", "url": "https://bugzilla.suse.com/1084536" }, { "category": "self", "summary": "SUSE Bug 1085331", "url": "https://bugzilla.suse.com/1085331" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1087209", "url": "https://bugzilla.suse.com/1087209" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1087762", "url": "https://bugzilla.suse.com/1087762" }, { "category": "self", "summary": "SUSE Bug 1088147", "url": "https://bugzilla.suse.com/1088147" }, { "category": "self", "summary": "SUSE Bug 1088260", "url": "https://bugzilla.suse.com/1088260" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 940776", "url": "https://bugzilla.suse.com/940776" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5156 page", "url": "https://www.suse.com/security/cve/CVE-2015-5156/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7915 page", "url": "https://www.suse.com/security/cve/CVE-2016-7915/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0861 page", "url": "https://www.suse.com/security/cve/CVE-2017-0861/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12190 page", "url": "https://www.suse.com/security/cve/CVE-2017-12190/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16644 page", "url": "https://www.suse.com/security/cve/CVE-2017-16644/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16911 page", "url": "https://www.suse.com/security/cve/CVE-2017-16911/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16912 page", "url": "https://www.suse.com/security/cve/CVE-2017-16912/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16913 page", "url": "https://www.suse.com/security/cve/CVE-2017-16913/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16914 page", "url": "https://www.suse.com/security/cve/CVE-2017-16914/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18203 page", "url": "https://www.suse.com/security/cve/CVE-2017-18203/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18208 page", "url": "https://www.suse.com/security/cve/CVE-2017-18208/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6927 page", "url": "https://www.suse.com/security/cve/CVE-2018-6927/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7757 page", "url": "https://www.suse.com/security/cve/CVE-2018-7757/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-08T17:33:21Z", "generator": { "date": "2018-05-08T17:33:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1172-1", "initial_release_date": "2018-05-08T17:33:21Z", "revision_history": [ { "date": "2018-05-08T17:33:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-default-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-pae-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-source-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-syms-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-trace-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-xen-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-source-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5156" } ], "notes": [ { "category": "general", "text": "The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5156", "url": "https://www.suse.com/security/cve/CVE-2015-5156" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1123903" }, { "category": "external", "summary": "SUSE Bug 940776 for CVE-2015-5156", "url": "https://bugzilla.suse.com/940776" }, { "category": "external", "summary": "SUSE Bug 945048 for CVE-2015-5156", "url": "https://bugzilla.suse.com/945048" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-5156", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2015-5156" }, { "cve": "CVE-2016-7915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7915" } ], "notes": [ { "category": "general", "text": "The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7915", "url": "https://www.suse.com/security/cve/CVE-2016-7915" }, { "category": "external", "summary": "SUSE Bug 1010470 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1010470" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2016-7915" }, { "cve": "CVE-2017-0861", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0861" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0861", "url": "https://www.suse.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "SUSE Bug 1088260 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088260" }, { "category": "external", "summary": "SUSE Bug 1088268 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088268" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-0861" }, { "cve": "CVE-2017-12190", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12190" } ], "notes": [ { "category": "general", "text": "The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12190", "url": "https://www.suse.com/security/cve/CVE-2017-12190" }, { "category": "external", "summary": "SUSE Bug 1062568 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1062568" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-12190" }, { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2017-16644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16644" } ], "notes": [ { "category": "general", "text": "The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16644", "url": "https://www.suse.com/security/cve/CVE-2017-16644" }, { "category": "external", "summary": "SUSE Bug 1067118 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1067118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-16644" }, { "cve": "CVE-2017-16911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16911" } ], "notes": [ { "category": "general", "text": "The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16911", "url": "https://www.suse.com/security/cve/CVE-2017-16911" }, { "category": "external", "summary": "SUSE Bug 1078674 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1078674" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "low" } ], "title": "CVE-2017-16911" }, { "cve": "CVE-2017-16912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16912" } ], "notes": [ { "category": "general", "text": "The \"get_pipe()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16912", "url": "https://www.suse.com/security/cve/CVE-2017-16912" }, { "category": "external", "summary": "SUSE Bug 1078673 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1078673" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-16912" }, { "cve": "CVE-2017-16913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16913" } ], "notes": [ { "category": "general", "text": "The \"stub_recv_cmd_submit()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16913", "url": "https://www.suse.com/security/cve/CVE-2017-16913" }, { "category": "external", "summary": "SUSE Bug 1078672 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1078672" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-16913" }, { "cve": "CVE-2017-16914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16914" } ], "notes": [ { "category": "general", "text": "The \"stub_send_ret_submit()\" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16914", "url": "https://www.suse.com/security/cve/CVE-2017-16914" }, { "category": "external", "summary": "SUSE Bug 1078669 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1078669" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "low" } ], "title": "CVE-2017-16914" }, { "cve": "CVE-2017-18203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18203" } ], "notes": [ { "category": "general", "text": "The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18203", "url": "https://www.suse.com/security/cve/CVE-2017-18203" }, { "category": "external", "summary": "SUSE Bug 1083242 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1083242" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-18203" }, { "cve": "CVE-2017-18208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18208" } ], "notes": [ { "category": "general", "text": "The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18208", "url": "https://www.suse.com/security/cve/CVE-2017-18208" }, { "category": "external", "summary": "SUSE Bug 1083494 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1083494" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-18208" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-6927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6927" } ], "notes": [ { "category": "general", "text": "The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6927", "url": "https://www.suse.com/security/cve/CVE-2018-6927" }, { "category": "external", "summary": "SUSE Bug 1080757 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1080757" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-6927" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2018-7566" }, { "cve": "CVE-2018-7757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7757" } ], "notes": [ { "category": "general", "text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7757", "url": "https://www.suse.com/security/cve/CVE-2018-7757" }, { "category": "external", "summary": "SUSE Bug 1084536 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1084536" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087209 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087209" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-7757" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1505-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_29 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1065,SUSE-SLE-SERVER-12-SP2-2018-1065", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1505-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1505-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181505-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1505-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:28Z", "generator": { "date": "2018-06-05T15:36:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1505-1", "initial_release_date": "2018-06-05T15:36:28Z", "revision_history": [ { "date": "2018-06-05T15:36:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "product_id": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:28Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:28Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:28Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:28Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1640-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-6_38 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1106", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1640-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1640-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181640-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1640-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:38:23Z", "generator": { "date": "2018-06-11T08:38:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1640-1", "initial_release_date": "2018-06-11T08:38:23Z", "revision_history": [ { "date": "2018-06-11T08:38:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "product_id": "kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:23Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:23Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:23Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:23Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1220-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c in might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).\n- CVE-2017-13220: An elevation of privilege vulnerability in the Upstream kernel bluez was fixed. (bnc#1076537).\n- CVE-2017-11089: A buffer overread is observed in nl80211_set_station when user space application sends attribute NL80211_ATTR_LOCAL_MESH_POWER_MODE with data of size less than 4 bytes (bnc#1088261).\n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allowed local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).\n\nThe following non-security bugs were fixed:\n\n- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.\n- kabi: x86/kaiser: properly align trampoline stack (bsc#1087260).\n- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).\n- kGraft: fix small race in reversion code (bsc#1083125).\n- kabi/severities: Ignore kgr_shadow_* kABI changes\n- kvm/x86: fix icebp instruction handling (bsc#1087088).\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).\n- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).\n- x86/kaiser: properly align trampoline stack (bsc#1087260).\n- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-6-2018-845,SUSE-SLE-Module-Public-Cloud-12-2018-845,SUSE-SLE-SAP-12-SP1-2018-845,SUSE-SLE-SERVER-12-SP1-2018-845", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1220-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1220-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181220-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1220-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003997.html" }, { "category": "self", "summary": "SUSE Bug 1076537", "url": "https://bugzilla.suse.com/1076537" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1083242", "url": "https://bugzilla.suse.com/1083242" }, { "category": "self", "summary": "SUSE Bug 1083275", "url": "https://bugzilla.suse.com/1083275" }, { "category": "self", "summary": "SUSE Bug 1084536", "url": "https://bugzilla.suse.com/1084536" }, { "category": "self", "summary": "SUSE Bug 1085279", "url": "https://bugzilla.suse.com/1085279" }, { "category": "self", "summary": "SUSE Bug 1085331", "url": "https://bugzilla.suse.com/1085331" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1086194", "url": "https://bugzilla.suse.com/1086194" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1088147", "url": "https://bugzilla.suse.com/1088147" }, { "category": "self", "summary": "SUSE Bug 1088260", "url": "https://bugzilla.suse.com/1088260" }, { "category": "self", "summary": "SUSE Bug 1088261", "url": "https://bugzilla.suse.com/1088261" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0861 page", "url": "https://www.suse.com/security/cve/CVE-2017-0861/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11089 page", "url": "https://www.suse.com/security/cve/CVE-2017-11089/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13220 page", "url": "https://www.suse.com/security/cve/CVE-2017-13220/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18203 page", "url": "https://www.suse.com/security/cve/CVE-2017-18203/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7757 page", "url": "https://www.suse.com/security/cve/CVE-2018-7757/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-11T15:30:04Z", "generator": { "date": "2018-05-11T15:30:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1220-1", "initial_release_date": "2018-05-11T15:30:04Z", "revision_history": [ { "date": "2018-05-11T15:30:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.88.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.88.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.88.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.88.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.88.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.88.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.88.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.88.1.noarch", "product_id": "kernel-source-3.12.74-60.64.88.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.88.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.88.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.88.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.88.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.88.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.88.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.88.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.88.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.88.1.s390x", "product_id": "kernel-default-3.12.74-60.64.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.88.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.88.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.88.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.88.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.88.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.88.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.88.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.88.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.88.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.88.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.88.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 6", "product": { "name": "SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.88.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.88.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.88.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-0861", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0861" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0861", "url": "https://www.suse.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "SUSE Bug 1088260 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088260" }, { "category": "external", "summary": "SUSE Bug 1088268 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088268" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2017-0861" }, { "cve": "CVE-2017-11089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11089" } ], "notes": [ { "category": "general", "text": "In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a buffer overread is observed in nl80211_set_station when user space application sends attribute NL80211_ATTR_LOCAL_MESH_POWER_MODE with data of size less than 4 bytes", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11089", "url": "https://www.suse.com/security/cve/CVE-2017-11089" }, { "category": "external", "summary": "SUSE Bug 1088261 for CVE-2017-11089", "url": "https://bugzilla.suse.com/1088261" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2017-11089" }, { "cve": "CVE-2017-13220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13220" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13220", "url": "https://www.suse.com/security/cve/CVE-2017-13220" }, { "category": "external", "summary": "SUSE Bug 1076537 for CVE-2017-13220", "url": "https://bugzilla.suse.com/1076537" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2017-13220" }, { "cve": "CVE-2017-18203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18203" } ], "notes": [ { "category": "general", "text": "The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18203", "url": "https://www.suse.com/security/cve/CVE-2017-18203" }, { "category": "external", "summary": "SUSE Bug 1083242 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1083242" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2017-18203" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-7757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7757" } ], "notes": [ { "category": "general", "text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7757", "url": "https://www.suse.com/security/cve/CVE-2018-7757" }, { "category": "external", "summary": "SUSE Bug 1084536 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1084536" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087209 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087209" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2018-7757" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1534-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_35 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1067,SUSE-SLE-SERVER-12-SP2-2018-1067", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1534-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1534-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181534-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1534-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:42Z", "generator": { "date": "2018-06-05T15:36:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1534-1", "initial_release_date": "2018-06-05T15:36:42Z", "revision_history": [ { "date": "2018-06-05T15:36:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:42Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:42Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:42Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:42Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1645-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-6_33 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1107", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1645-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1645-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181645-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1645-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:38:54Z", "generator": { "date": "2018-06-11T08:38:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1645-1", "initial_release_date": "2018-06-11T08:38:54Z", "revision_history": [ { "date": "2018-06-11T08:38:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "product_id": "kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:54Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:54Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:54Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:54Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1171-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n\nThe following non-security bugs were fixed:\n\n- kvm/x86: fix icebp instruction handling (bsc#1087088).\n- media: cpia2: Fix a couple off by one bugs (bsc#1050431).\n- nfs: add nostatflush mount option (bsc#1065726).\n- nfs: allow flush-on-stat to be disabled (bsc#1065726).\n- powerpc/fadump: Add a warning when \u0027fadump_reserve_mem=\u0027 is used (bnc#1032084, FATE#323225).\n- powerpc/fadump: reuse crashkernel parameter for fadump memory reservation (bnc#1032084, FATE#323225).\n- powerpc/fadump: update documentation about crashkernel parameter reuse (bnc#1032084, FATE#323225).\n- powerpc/fadump: use \u0027fadump_reserve_mem=\u0027 when specified (bnc#1032084, FATE#323225).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-source-20180508-13592,slessp4-kernel-source-20180508-13592,slexsp3-kernel-source-20180508-13592", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1171-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1171-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181171-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1171-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003977.html" }, { "category": "self", "summary": "SUSE Bug 1032084", "url": "https://bugzilla.suse.com/1032084" }, { "category": "self", "summary": "SUSE Bug 1050431", "url": "https://bugzilla.suse.com/1050431" }, { "category": "self", "summary": "SUSE Bug 1065726", "url": "https://bugzilla.suse.com/1065726" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1089665", "url": "https://bugzilla.suse.com/1089665" }, { "category": "self", "summary": "SUSE Bug 1089668", "url": "https://bugzilla.suse.com/1089668" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-08T17:38:47Z", "generator": { "date": "2018-05-08T17:38:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1171-1", "initial_release_date": "2018-05-08T17:38:47Z", "revision_history": [ { "date": "2018-05-08T17:38:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.41.1.i586", "product": { "name": "kernel-default-3.0.101-108.41.1.i586", "product_id": "kernel-default-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.41.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.41.1.i586", "product_id": "kernel-default-base-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.41.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.41.1.i586", "product_id": "kernel-default-devel-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.41.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.41.1.i586", "product_id": "kernel-ec2-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.41.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.41.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.41.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.41.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.41.1.i586", "product": { "name": "kernel-pae-3.0.101-108.41.1.i586", "product_id": "kernel-pae-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.41.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.41.1.i586", "product_id": "kernel-pae-base-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.41.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.41.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.41.1.i586", "product": { "name": "kernel-source-3.0.101-108.41.1.i586", "product_id": "kernel-source-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.41.1.i586", "product": { "name": "kernel-syms-3.0.101-108.41.1.i586", "product_id": "kernel-syms-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.41.1.i586", "product": { "name": "kernel-trace-3.0.101-108.41.1.i586", "product_id": "kernel-trace-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.41.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.41.1.i586", "product_id": "kernel-trace-base-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.41.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.41.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.41.1.i586", "product": { "name": "kernel-xen-3.0.101-108.41.1.i586", "product_id": "kernel-xen-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.41.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.41.1.i586", "product_id": "kernel-xen-base-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.41.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.41.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.41.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.41.1.ia64", "product": { "name": "kernel-default-3.0.101-108.41.1.ia64", "product_id": "kernel-default-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.41.1.ia64", "product": { "name": "kernel-default-base-3.0.101-108.41.1.ia64", "product_id": "kernel-default-base-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.41.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-108.41.1.ia64", "product_id": "kernel-default-devel-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.41.1.ia64", "product": { "name": "kernel-source-3.0.101-108.41.1.ia64", "product_id": "kernel-source-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.41.1.ia64", "product": { "name": "kernel-syms-3.0.101-108.41.1.ia64", "product_id": "kernel-syms-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.41.1.ia64", "product": { "name": "kernel-trace-3.0.101-108.41.1.ia64", "product_id": "kernel-trace-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.41.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-108.41.1.ia64", "product_id": "kernel-trace-base-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.41.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-108.41.1.ia64", "product_id": "kernel-trace-devel-3.0.101-108.41.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-108.41.1.noarch", "product": { "name": "kernel-docs-3.0.101-108.41.1.noarch", "product_id": "kernel-docs-3.0.101-108.41.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.41.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.41.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.41.1.ppc64", "product_id": "kernel-default-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.41.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.41.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.41.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.41.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.41.1.ppc64", "product_id": "kernel-source-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.41.1.ppc64", "product_id": "kernel-syms-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.41.1.ppc64", "product_id": "kernel-trace-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.41.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.41.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.41.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.41.1.s390x", "product": { "name": "kernel-default-3.0.101-108.41.1.s390x", "product_id": "kernel-default-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.41.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.41.1.s390x", "product_id": "kernel-default-base-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.41.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.41.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.41.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.41.1.s390x", "product_id": "kernel-default-man-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.41.1.s390x", "product": { "name": "kernel-source-3.0.101-108.41.1.s390x", "product_id": "kernel-source-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.41.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.41.1.s390x", "product_id": "kernel-syms-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.41.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.41.1.s390x", "product_id": "kernel-trace-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.41.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.41.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.41.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.41.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.41.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.41.1.x86_64", "product_id": "kernel-default-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.41.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.41.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.41.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.41.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.41.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.41.1.x86_64", "product_id": "kernel-source-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.41.1.x86_64", "product_id": "kernel-syms-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.41.1.x86_64", "product_id": "kernel-trace-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.41.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.41.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.41.1.x86_64", "product_id": "kernel-xen-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.41.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.41.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.41.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-108.41.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" }, "product_reference": "kernel-docs-3.0.101-108.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586" }, "product_reference": "kernel-source-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586" }, "product_reference": "kernel-source-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:38:47Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:38:47Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:38:47Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1548-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.90-92_45 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1061,SUSE-SLE-SERVER-12-SP2-2018-1061", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1548-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1548-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181548-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1548-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T14:48:23Z", "generator": { "date": "2018-06-05T14:48:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1548-1", "initial_release_date": "2018-06-05T14:48:23Z", "revision_history": [ { "date": "2018-06-05T14:48:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:23Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:23Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:23Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:23Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1221-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536 1087209).\n- CVE-2017-13220: An elevation of privilege vulnerability in the Upstream kernel bluez was fixed. (bnc#1076537).\n- CVE-2017-11089: A buffer overread was observed in nl80211_set_station when user space application sends attribute NL80211_ATTR_LOCAL_MESH_POWER_MODE with data of size less than 4 bytes (bnc#1088261).\n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).\n\nThe following non-security bugs were fixed:\n\n- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.\n- KABI: x86/kaiser: properly align trampoline stack (bsc#1087260).\n- kGraft: fix small race in reversion code (bsc#1083125).\n- kabi/severities: Ignore kgr_shadow_* kABI changes\n- kvm/x86: fix icebp instruction handling (bsc#1087088).\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/kaiser: properly align trampoline stack (bsc#1087260).\n- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2018-844,SUSE-SLE-SERVER-12-2018-844", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1221-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1221-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181221-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1221-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003998.html" }, { "category": "self", "summary": "SUSE Bug 1076537", "url": "https://bugzilla.suse.com/1076537" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1083242", "url": "https://bugzilla.suse.com/1083242" }, { "category": "self", "summary": "SUSE Bug 1084536", "url": "https://bugzilla.suse.com/1084536" }, { "category": "self", "summary": "SUSE Bug 1085331", "url": "https://bugzilla.suse.com/1085331" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1087209", "url": "https://bugzilla.suse.com/1087209" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1088147", "url": "https://bugzilla.suse.com/1088147" }, { "category": "self", "summary": "SUSE Bug 1088260", "url": "https://bugzilla.suse.com/1088260" }, { "category": "self", "summary": "SUSE Bug 1088261", "url": "https://bugzilla.suse.com/1088261" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0861 page", "url": "https://www.suse.com/security/cve/CVE-2017-0861/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11089 page", "url": "https://www.suse.com/security/cve/CVE-2017-11089/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13220 page", "url": "https://www.suse.com/security/cve/CVE-2017-13220/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18203 page", "url": "https://www.suse.com/security/cve/CVE-2017-18203/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7757 page", "url": "https://www.suse.com/security/cve/CVE-2018-7757/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-11T15:16:24Z", "generator": { "date": "2018-05-11T15:16:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1221-1", "initial_release_date": "2018-05-11T15:16:24Z", "revision_history": [ { "date": "2018-05-11T15:16:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.61-52.128.1.noarch", "product": { "name": "kernel-devel-3.12.61-52.128.1.noarch", "product_id": "kernel-devel-3.12.61-52.128.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.61-52.128.1.noarch", "product": { "name": "kernel-macros-3.12.61-52.128.1.noarch", "product_id": "kernel-macros-3.12.61-52.128.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.61-52.128.1.noarch", "product": { "name": "kernel-source-3.12.61-52.128.1.noarch", "product_id": "kernel-source-3.12.61-52.128.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.128.1.ppc64le", "product": { "name": "kernel-default-3.12.61-52.128.1.ppc64le", "product_id": "kernel-default-3.12.61-52.128.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.128.1.ppc64le", "product": { "name": "kernel-default-base-3.12.61-52.128.1.ppc64le", "product_id": "kernel-default-base-3.12.61-52.128.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.128.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.61-52.128.1.ppc64le", "product_id": "kernel-default-devel-3.12.61-52.128.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.128.1.ppc64le", "product": { "name": "kernel-syms-3.12.61-52.128.1.ppc64le", "product_id": "kernel-syms-3.12.61-52.128.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.128.1.s390x", "product": { "name": "kernel-default-3.12.61-52.128.1.s390x", "product_id": "kernel-default-3.12.61-52.128.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.128.1.s390x", "product": { "name": "kernel-default-base-3.12.61-52.128.1.s390x", "product_id": "kernel-default-base-3.12.61-52.128.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.128.1.s390x", "product": { "name": "kernel-default-devel-3.12.61-52.128.1.s390x", "product_id": "kernel-default-devel-3.12.61-52.128.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.61-52.128.1.s390x", "product": { "name": "kernel-default-man-3.12.61-52.128.1.s390x", "product_id": "kernel-default-man-3.12.61-52.128.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.128.1.s390x", "product": { "name": "kernel-syms-3.12.61-52.128.1.s390x", "product_id": "kernel-syms-3.12.61-52.128.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-ec2-3.12.61-52.128.1.x86_64", "product_id": "kernel-ec2-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.61-52.128.1.x86_64", "product_id": "kernel-ec2-devel-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.61-52.128.1.x86_64", "product_id": "kernel-ec2-extra-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-default-3.12.61-52.128.1.x86_64", "product_id": "kernel-default-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-default-base-3.12.61-52.128.1.x86_64", "product_id": "kernel-default-base-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-default-devel-3.12.61-52.128.1.x86_64", "product_id": "kernel-default-devel-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-syms-3.12.61-52.128.1.x86_64", "product_id": "kernel-syms-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-xen-3.12.61-52.128.1.x86_64", "product_id": "kernel-xen-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-xen-base-3.12.61-52.128.1.x86_64", "product_id": "kernel-xen-base-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.61-52.128.1.x86_64", "product_id": "kernel-xen-devel-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-ec2-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.128.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le" }, "product_reference": "kernel-default-3.12.61-52.128.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.128.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x" }, "product_reference": "kernel-default-3.12.61-52.128.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.128.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.61-52.128.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.128.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x" }, "product_reference": "kernel-default-base-3.12.61-52.128.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.128.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.61-52.128.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.128.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x" }, "product_reference": "kernel-default-devel-3.12.61-52.128.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.61-52.128.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x" }, "product_reference": "kernel-default-man-3.12.61-52.128.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.128.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.128.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.128.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.128.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.128.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.128.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.128.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le" }, "product_reference": "kernel-syms-3.12.61-52.128.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.128.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x" }, "product_reference": "kernel-syms-3.12.61-52.128.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-0861", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0861" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0861", "url": "https://www.suse.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "SUSE Bug 1088260 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088260" }, { "category": "external", "summary": "SUSE Bug 1088268 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088268" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2017-0861" }, { "cve": "CVE-2017-11089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11089" } ], "notes": [ { "category": "general", "text": "In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a buffer overread is observed in nl80211_set_station when user space application sends attribute NL80211_ATTR_LOCAL_MESH_POWER_MODE with data of size less than 4 bytes", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11089", "url": "https://www.suse.com/security/cve/CVE-2017-11089" }, { "category": "external", "summary": "SUSE Bug 1088261 for CVE-2017-11089", "url": "https://bugzilla.suse.com/1088261" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2017-11089" }, { "cve": "CVE-2017-13220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13220" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13220", "url": "https://www.suse.com/security/cve/CVE-2017-13220" }, { "category": "external", "summary": "SUSE Bug 1076537 for CVE-2017-13220", "url": "https://bugzilla.suse.com/1076537" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2017-13220" }, { "cve": "CVE-2017-18203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18203" } ], "notes": [ { "category": "general", "text": "The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18203", "url": "https://www.suse.com/security/cve/CVE-2017-18203" }, { "category": "external", "summary": "SUSE Bug 1083242 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1083242" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2017-18203" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-7757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7757" } ], "notes": [ { "category": "general", "text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7757", "url": "https://www.suse.com/security/cve/CVE-2018-7757" }, { "category": "external", "summary": "SUSE Bug 1084536 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1084536" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087209 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087209" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2018-7757" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
rhsa-2018:1710
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for redhat-virtualization-host is now available for RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the redhat-virtualization-host side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1710", "url": "https://access.redhat.com/errata/RHSA-2018:1710" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "1580328", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580328" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1710.json" } ], "title": "Red Hat Security Advisory: redhat-virtualization-host security update", "tracking": { "current_release_date": "2025-08-02T08:08:39+00:00", "generator": { "date": "2025-08-02T08:08:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1710", "initial_release_date": "2018-05-23T15:56:56+00:00", "revision_history": [ { "date": "2018-05-23T15:56:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-23T15:56:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:08:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 7-based RHEV-H ELS", "product": { "name": "RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch", "product_id": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@3.6-20180521.0.el7_3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "product": { "name": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "product_id": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@3.6-20180521.0.el7_3?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src as a component of RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src" }, "product_reference": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch as a component of RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch", "relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T15:56:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1710" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" }, { "names": [ "Ken Johnson" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2018-3639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566890" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative store bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "RHBZ#1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf", "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf", "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" } ], "release_date": "2018-05-21T21:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T15:56:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1710" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative store bypass" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T15:56:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1710" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1524
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated redhat-virtualization-host packages that fix several bugs and add various enhancements are now available.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nIncludes GlusterFS fixes for CVE-2018-1088, dhcp fixes for CVE-2018-1111, kernel fixes for CVE-2018-1087, and kernel fixes for CVE-2018-8897.\n\nA list of bugs fixed in this update is available in the Technical Notes book: https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.2/html/technical_notes/", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1524", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1357247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357247" }, { "category": "external", "summary": "1374007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374007" }, { "category": "external", "summary": "1420068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420068" }, { "category": "external", "summary": "1422676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422676" }, { "category": "external", "summary": "1429485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429485" }, { "category": "external", "summary": "1433394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433394" }, { "category": "external", "summary": "1443965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443965" }, { "category": "external", "summary": "1454536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1454536" }, { "category": "external", "summary": "1474268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474268" }, { "category": "external", "summary": "1489567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489567" }, { "category": "external", "summary": "1501161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501161" }, { "category": "external", "summary": "1502920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502920" }, { "category": "external", "summary": "1503148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503148" }, { "category": "external", "summary": "1516123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516123" }, { "category": "external", "summary": "1534855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534855" }, { "category": "external", "summary": "1535791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535791" }, { "category": "external", "summary": "1542833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542833" }, { "category": "external", "summary": "1547864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547864" }, { "category": "external", "summary": "1549630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549630" }, { "category": "external", "summary": "1554186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554186" }, { "category": "external", "summary": "1555243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555243" }, { "category": "external", "summary": "1555254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555254" }, { "category": "external", "summary": "1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "1561258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561258" }, { "category": "external", "summary": "1563530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563530" }, { "category": "external", "summary": "1565497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565497" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1567974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567974" }, { "category": "external", "summary": "1571134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571134" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1524.json" } ], "title": "Red Hat Security Advisory: redhat-virtualization-host bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-02T08:07:53+00:00", "generator": { "date": "2025-08-02T08:07:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1524", "initial_release_date": "2018-05-15T17:40:52+00:00", "revision_history": [ { "date": "2018-05-15T17:40:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-15T17:40:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:07:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product": { "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product_id": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-node-ng-nodectl@4.2.0-0.20170814.0.el7?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-3.0.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product": { "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product_id": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-imgbased@1.0.16-0.1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product": { "name": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product_id": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.0.16-0.1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20180508.0.el7_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product": { "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product_id": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-node-ng@4.2.0-0.20170814.0.el7?arch=src" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product_id": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.0.el7?arch=src" } } }, { "category": "product_version", "name": "imgbased-0:1.0.16-0.1.el7ev.src", "product": { "name": "imgbased-0:1.0.16-0.1.el7ev.src", "product_id": "imgbased-0:1.0.16-0.1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.0.16-0.1.el7ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product": { "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product_id": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20180508.0.el7_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product_id": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.0.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src" }, "product_reference": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.0.16-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch" }, "product_reference": "imgbased-0:1.0.16-0.1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.0.16-0.1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src" }, "product_reference": "imgbased-0:1.0.16-0.1.el7ev.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src" }, "product_reference": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch" }, "product_reference": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch" }, "product_reference": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src" }, "product_reference": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "John Strunk" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1088", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1558721" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in gluster snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that have, or have previously had, Gluster volume snapshot scheduling enabled from the CLI. Red Hat Enterprise Virtualization supports volume snapshot scheduling from the Web UI, which uses a distinct mechanism that is not subject to this vulnerability. VM snapshots are not impacted by this flaw. For more information, please see the Vulnerability Article linked under External References.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6, and 7 because only gluster client is shipped in these products. CVE-2018-1088 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1088" }, { "category": "external", "summary": "RHBZ#1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1088", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1088" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088" }, { "category": "external", "summary": "https://access.redhat.com/articles/3414511", "url": "https://access.redhat.com/articles/3414511" } ], "release_date": "2018-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "workaround", "details": "To limit exposure of gluster server nodes : \n\n1. gluster server should be on LAN and not reachable from public networks. \n2. Use gluster auth.allow and auth.reject. \n3. Use TLS certificates between gluster server nodes and clients. \n\nCaveat: This would only mitigate attacks from unauthorized malicious clients. gluster clients allowed by auth.allow or having signed TLS client certificates would still be able to trigger this attack.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm" ], "organization": "Google Security Team" } ], "cve": "CVE-2018-1111", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2018-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567974" } ], "notes": [ { "category": "description", "text": "A command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in Red Hat Enterprise Linux. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.", "title": "Vulnerability description" }, { "category": "summary", "text": "dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has been made aware of a vulnerability affecting the DHCP client packages as shipped with Red Hat Enterprise Linux 6 and 7. This vulnerability CVE-2018-1111 was rated as having a security impact of Critical. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.\n\nRed Hat Enterprise Virtualization 4.1 includes the vulnerable components, but the default configuration is not impacted because NetworkManager is turned off in the Management Appliance, and not used in conjunction with DHCP in the Hypervisor. Customers can still obtain the updated packages from Red Hat Enterprise Linux channels using `yum update`, or upgrade to Red Hat Enterprise Virtualization 4.2, which includes the fixed packages.\n\nRed Hat Enterprise Virtualization 3.6 is not vulnerable as it does not use DHCP.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1111" }, { "category": "external", "summary": "RHBZ#1567974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1111", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1111" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3442151", "url": "https://access.redhat.com/security/vulnerabilities/3442151" } ], "release_date": "2018-05-15T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "workaround", "details": "Please access https://access.redhat.com/security/vulnerabilities/3442151 for information on how to mitigate this issue.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1348
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1348", "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1348.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T08:08:11+00:00", "generator": { "date": "2025-08-02T08:08:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1348", "initial_release_date": "2018-05-08T21:57:33+00:00", "revision_history": [ { "date": "2018-05-08T21:57:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-09T06:31:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:08:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "product_id": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "perf-0:3.10.0-514.48.3.el7.x86_64", "product_id": "perf-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "product_id": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.48.3.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.48.3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-514.48.3.el7.src", "product": { "name": "kernel-0:3.10.0-514.48.3.el7.src", "product_id": "kernel-0:3.10.0-514.48.3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64", "product_id": "perf-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "product_id": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.3.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "perf-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "perf-0:3.10.0-514.48.3.el7.s390x", "product_id": "perf-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "python-perf-0:3.10.0-514.48.3.el7.s390x", "product_id": "python-perf-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.src", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.src", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.src", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:57:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1348" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:57:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1348" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1000199", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568477" } ], "notes": [ { "category": "description", "text": "An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace() incorrect error handling leads to corruption and DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "RHBZ#1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199" } ], "release_date": "2018-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:57:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "category": "workaround", "details": "To mitigate this issue:\n1) Save the following script in a \u0027CVE-2018-1000199.stp\u0027 file.\n---\nprobe kernel.function(\"ptrace_set_debugreg\") {\n if ($n \u003c 4)\n $n = 4; /* set invalid debug register #, returns -EIO */\n}\nprobe begin {\n printk(0, \"CVE-2018-1000199 mitigation loaded\")\n}\nprobe end {\n printk(0, \"CVE-2018-1000199 mitigation unloaded\")\n}\n---\n2) Install systemtap package and its dependencies\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common\n\n3) Build the mitigation kernel module as root.\n # stap -r `uname -r` -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4\n\n4) Load the mitigation module as root\n # staprun -L cve_2018_1000199.ko", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace() incorrect error handling leads to corruption and DoS" } ] }
rhsa-2018:1318
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation (CVE-2017-16939)\n\n* kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c (CVE-2018-1068)\n\n* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)\n\n* kernel: guest kernel crash during core dump on POWER9 host (CVE-2018-1091)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3431641", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1318", "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "https://access.redhat.com/articles/3431641", "url": "https://access.redhat.com/articles/3431641" }, { "category": "external", "summary": "1517220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517220" }, { "category": "external", "summary": "1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "1558149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558149" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1318.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-02T08:06:59+00:00", "generator": { "date": "2025-08-02T08:06:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1318", "initial_release_date": "2018-05-08T18:32:03+00:00", "revision_history": [ { "date": "2018-05-08T18:32:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-09T17:35:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:06:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64", "product_id": "perf-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "product_id": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.2.3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "product_id": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.2.3.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.2.3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-862.2.3.el7.src", "product": { "name": "kernel-0:3.10.0-862.2.3.el7.src", "product_id": "kernel-0:3.10.0-862.2.3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.2.3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x", "product_id": "python-perf-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "perf-0:3.10.0-862.2.3.el7.s390x", "product_id": "perf-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.2.3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "product_id": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64", "product_id": "perf-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.2.3.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "perf-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.2.3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-16939", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1517220" } ], "notes": [ { "category": "description", "text": "The Linux kernel is vulerable to a use-after-free flaw when Transformation User configuration interface(CONFIG_XFRM_USER) compile-time configuration were enabled. This vulnerability occurs while closing a xfrm netlink socket in xfrm_dump_policy_done. A user/process could abuse this flaw to potentially escalate their privileges on a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16939" }, { "category": "external", "summary": "RHBZ#1517220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16939", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939" } ], "release_date": "2017-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation" }, { "cve": "CVE-2018-1068", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1552048" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "RHBZ#1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068" } ], "release_date": "2018-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "cve": "CVE-2018-1091", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2018-02-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1558149" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel where a crash can be triggered from unprivileged userspace during core dump on a POWER system with a certain configuration. This is due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: guest kernel crash during core dump on POWER9 host", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1091" }, { "category": "external", "summary": "RHBZ#1558149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1091", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1091" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1091", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1091" } ], "release_date": "2017-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: guest kernel crash during core dump on POWER9 host" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1000199", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568477" } ], "notes": [ { "category": "description", "text": "An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace() incorrect error handling leads to corruption and DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "RHBZ#1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199" } ], "release_date": "2018-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "category": "workaround", "details": "To mitigate this issue:\n1) Save the following script in a \u0027CVE-2018-1000199.stp\u0027 file.\n---\nprobe kernel.function(\"ptrace_set_debugreg\") {\n if ($n \u003c 4)\n $n = 4; /* set invalid debug register #, returns -EIO */\n}\nprobe begin {\n printk(0, \"CVE-2018-1000199 mitigation loaded\")\n}\nprobe end {\n printk(0, \"CVE-2018-1000199 mitigation unloaded\")\n}\n---\n2) Install systemtap package and its dependencies\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common\n\n3) Build the mitigation kernel module as root.\n # stap -r `uname -r` -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4\n\n4) Load the mitigation module as root\n # staprun -L cve_2018_1000199.ko", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace() incorrect error handling leads to corruption and DoS" } ] }
rhsa-2018:1345
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1345", "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1345.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T08:07:12+00:00", "generator": { "date": "2025-08-02T08:07:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1345", "initial_release_date": "2018-05-08T19:53:11+00:00", "revision_history": [ { "date": "2018-05-08T19:53:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-09T06:14:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:07:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "python-perf-0:3.10.0-693.25.4.el7.s390x", "product_id": "python-perf-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "perf-0:3.10.0-693.25.4.el7.s390x", "product_id": "perf-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.25.4.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "product_id": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "perf-0:3.10.0-693.25.4.el7.x86_64", "product_id": "perf-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.4.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "product_id": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64", "product_id": "perf-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.4.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "perf-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.4.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "product_id": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.25.4.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.25.4.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.25.4.el7.src", "product": { "name": "kernel-0:3.10.0-693.25.4.el7.src", "product_id": "kernel-0:3.10.0-693.25.4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.4.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.src", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.src", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.src", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:53:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:53:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1000199", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568477" } ], "notes": [ { "category": "description", "text": "An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace() incorrect error handling leads to corruption and DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "RHBZ#1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199" } ], "release_date": "2018-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:53:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "category": "workaround", "details": "To mitigate this issue:\n1) Save the following script in a \u0027CVE-2018-1000199.stp\u0027 file.\n---\nprobe kernel.function(\"ptrace_set_debugreg\") {\n if ($n \u003c 4)\n $n = 4; /* set invalid debug register #, returns -EIO */\n}\nprobe begin {\n printk(0, \"CVE-2018-1000199 mitigation loaded\")\n}\nprobe end {\n printk(0, \"CVE-2018-1000199 mitigation unloaded\")\n}\n---\n2) Install systemtap package and its dependencies\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common\n\n3) Build the mitigation kernel module as root.\n # stap -r `uname -r` -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4\n\n4) Load the mitigation module as root\n # staprun -L cve_2018_1000199.ko", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace() incorrect error handling leads to corruption and DoS" } ] }
rhsa-2018:1711
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rhev-hypervisor7 is now available for RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 6 and RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the rhev-hypervisor7 side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1711", "url": "https://access.redhat.com/errata/RHSA-2018:1711" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1711.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor7 security update", "tracking": { "current_release_date": "2025-08-02T08:08:33+00:00", "generator": { "date": "2025-08-02T08:08:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1711", "initial_release_date": "2018-05-23T16:00:52+00:00", "revision_history": [ { "date": "2018-05-23T16:00:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-23T16:00:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:08:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6 ELS", "product": { "name": "RHEV Hypervisor for RHEL-6 ELS", "product_id": "6Server-RHEV-Hypervisor-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } }, { "category": "product_name", "name": "RHEL 7-based RHEV-H ELS", "product": { "name": "RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "product": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "product_id": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el6ev?arch=src" } } }, { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src", "product": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src", "product_id": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el7ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "product": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "product_id": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "product": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "product_id": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el7ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch as a component of RHEV Hypervisor for RHEL-6 ELS", "product_id": "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch" }, "product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src as a component of RHEV Hypervisor for RHEL-6 ELS", "product_id": "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src" }, "product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "relates_to_product_reference": "6Server-RHEV-Hypervisor-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch as a component of RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch" }, "product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src as a component of RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" }, "product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src", "relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T16:00:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1711" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" }, { "names": [ "Ken Johnson" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2018-3639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566890" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative store bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "RHBZ#1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf", "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf", "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" } ], "release_date": "2018-05-21T21:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T16:00:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1711" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative store bypass" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T16:00:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1711" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1347
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1347", "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1347.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T08:08:18+00:00", "generator": { "date": "2025-08-02T08:08:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1347", "initial_release_date": "2018-05-08T21:39:48+00:00", "revision_history": [ { "date": "2018-05-08T21:39:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-09T06:29:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:08:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64", "product_id": "perf-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "product_id": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.66.3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-327.66.3.el7.src", "product": { "name": "kernel-0:3.10.0-327.66.3.el7.src", "product_id": "kernel-0:3.10.0-327.66.3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.66.3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.66.3.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "product_id": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.66.3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:39:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1347" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:39:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1347" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1000199", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568477" } ], "notes": [ { "category": "description", "text": "An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace() incorrect error handling leads to corruption and DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "RHBZ#1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199" } ], "release_date": "2018-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:39:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "category": "workaround", "details": "To mitigate this issue:\n1) Save the following script in a \u0027CVE-2018-1000199.stp\u0027 file.\n---\nprobe kernel.function(\"ptrace_set_debugreg\") {\n if ($n \u003c 4)\n $n = 4; /* set invalid debug register #, returns -EIO */\n}\nprobe begin {\n printk(0, \"CVE-2018-1000199 mitigation loaded\")\n}\nprobe end {\n printk(0, \"CVE-2018-1000199 mitigation unloaded\")\n}\n---\n2) Install systemtap package and its dependencies\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common\n\n3) Build the mitigation kernel module as root.\n # stap -r `uname -r` -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4\n\n4) Load the mitigation module as root\n # staprun -L cve_2018_1000199.ko", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace() incorrect error handling leads to corruption and DoS" } ] }
rhsa-2018:1355
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation (CVE-2017-16939)\n\n* kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c (CVE-2018-1068)\n\n* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-862.2.3 source tree, which provides a number of bug fixes over the previous version. (BZ#1549768)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1355", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1517220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517220" }, { "category": "external", "summary": "1549768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549768" }, { "category": "external", "summary": "1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1355.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:08:01+00:00", "generator": { "date": "2025-08-02T08:08:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1355", "initial_release_date": "2018-05-08T22:24:51+00:00", "revision_history": [ { "date": "2018-05-08T22:24:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-08T22:24:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:08:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-862.2.3.rt56.806.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "product": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "product_id": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.2.3.rt56.806.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-16939", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1517220" } ], "notes": [ { "category": "description", "text": "The Linux kernel is vulerable to a use-after-free flaw when Transformation User configuration interface(CONFIG_XFRM_USER) compile-time configuration were enabled. This vulnerability occurs while closing a xfrm netlink socket in xfrm_dump_policy_done. A user/process could abuse this flaw to potentially escalate their privileges on a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16939" }, { "category": "external", "summary": "RHBZ#1517220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16939", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939" } ], "release_date": "2017-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1355" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation" }, { "cve": "CVE-2018-1068", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1552048" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "RHBZ#1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068" } ], "release_date": "2018-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1355" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1355" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1355" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1000199", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568477" } ], "notes": [ { "category": "description", "text": "An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace() incorrect error handling leads to corruption and DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "RHBZ#1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199" } ], "release_date": "2018-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "category": "workaround", "details": "To mitigate this issue:\n1) Save the following script in a \u0027CVE-2018-1000199.stp\u0027 file.\n---\nprobe kernel.function(\"ptrace_set_debugreg\") {\n if ($n \u003c 4)\n $n = 4; /* set invalid debug register #, returns -EIO */\n}\nprobe begin {\n printk(0, \"CVE-2018-1000199 mitigation loaded\")\n}\nprobe end {\n printk(0, \"CVE-2018-1000199 mitigation unloaded\")\n}\n---\n2) Install systemtap package and its dependencies\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common\n\n3) Build the mitigation kernel module as root.\n # stap -r `uname -r` -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4\n\n4) Load the mitigation module as root\n # staprun -L cve_2018_1000199.ko", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace() incorrect error handling leads to corruption and DoS" } ] }
fkie_cve-2018-1087
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2018/05/08/5 | Mailing List | |
secalert@redhat.com | http://www.securityfocus.com/bid/104127 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1040862 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1318 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1345 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1347 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1348 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1355 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1524 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/security/vulnerabilities/pop_ss | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087 | Issue Tracking | |
secalert@redhat.com | https://usn.ubuntu.com/3641-1/ | Third Party Advisory | |
secalert@redhat.com | https://usn.ubuntu.com/3641-2/ | Third Party Advisory | |
secalert@redhat.com | https://www.debian.org/security/2018/dsa-4196 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2018/05/08/5 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104127 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040862 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1318 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1345 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1347 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1348 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1355 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1524 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/vulnerabilities/pop_ss | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3641-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3641-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4196 | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | 4.16 | |
linux | linux_kernel | 4.16 | |
linux | linux_kernel | 4.17 | |
linux | linux_kernel | 4.17 | |
linux | linux_kernel | 4.17 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.2 | |
redhat | enterprise_linux_server_aus | 7.3 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.3 | |
redhat | enterprise_linux_server_eus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_tus | 7.2 | |
redhat | enterprise_linux_server_tus | 7.3 | |
redhat | enterprise_linux_server_tus | 7.4 | |
redhat | enterprise_linux_virtualization | 4.0 | |
redhat | enterprise_linux_workstation | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*", "matchCriteriaId": "A63F7D1D-EB47-48AE-B89E-E84A63579FA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*", "matchCriteriaId": "01CC5953-3A04-4AA8-B8F9-18BFE5EF7FCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "6C5453A6-E8CE-411F-8B41-669F170FE6D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "7126FD36-70E6-4BAA-A0A7-F2A1C380F99A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "22D43572-4406-42D2-812F-79954D31CCC4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8DE8FF8A-4285-4D69-9F38-297457A117ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest." }, { "lang": "es", "value": "kernel KVM en versiones anteriores al kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 y kernel 4.17-rc3 es vulnerable a un error en la forma en la que el hipervisor KVM del kernel de Linux gestiona las excepciones lanzadas tras una operaci\u00f3n de cambio de pila mediante instrucciones Mov SS o Pop SS. Durante la operaci\u00f3n de cambio de pila, el procesador no lanz\u00f3 interrupciones y excepciones, sino que las lanza una vez se ha ejecutado la primera instrucci\u00f3n tras el cambio de pila. Un usuario invitado sin privilegios de KVM podr\u00eda usar este error para provocar el cierre inesperado del guest o escalar sus privilegios en el guest." } ], "id": "CVE-2018-1087", "lastModified": "2024-11-21T03:59:09.197", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-15T16:29:00.207", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2018/05/08/5" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104127" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040862" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-1/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-2/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2018/05/08/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4196" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-250" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-j658-wqr4-q3w7
Vulnerability from github
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
{ "affected": [], "aliases": [ "CVE-2018-1087" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-05-15T16:29:00Z", "severity": "HIGH" }, "details": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "id": "GHSA-j658-wqr4-q3w7", "modified": "2022-05-13T01:33:33Z", "published": "2022-05-13T01:33:33Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "type": "WEB", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3641-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3641-2" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4196" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2018/05/08/5" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/104127" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1040862" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2018-1087
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-1087", "description": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "id": "GSD-2018-1087", "references": [ "https://www.suse.com/security/cve/CVE-2018-1087.html", "https://www.debian.org/security/2018/dsa-4196", "https://access.redhat.com/errata/RHSA-2018:1711", "https://access.redhat.com/errata/RHSA-2018:1710", "https://access.redhat.com/errata/RHSA-2018:1524", "https://access.redhat.com/errata/RHSA-2018:1355", "https://access.redhat.com/errata/RHSA-2018:1348", "https://access.redhat.com/errata/RHSA-2018:1347", "https://access.redhat.com/errata/RHSA-2018:1345", "https://access.redhat.com/errata/RHSA-2018:1318", "https://ubuntu.com/security/CVE-2018-1087", "https://advisories.mageia.org/CVE-2018-1087.html", "https://alas.aws.amazon.com/cve/html/CVE-2018-1087.html", "https://linux.oracle.com/cve/CVE-2018-1087.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-1087" ], "details": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "id": "GSD-2018-1087", "modified": "2023-12-13T01:22:37.498657Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "KVM", "version": { "version_data": [ { "version_value": "kernel 4.16" }, { "version_value": "kernel 4.16-rc7" }, { "version_value": "kernel 4.17-rc1" }, { "version_value": "kernel 4.17-rc2" }, { "version_value": "kernel 4.17-rc3" } ] } } ] }, "vendor_name": "kernel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest." } ] }, "impact": { "cvss": [ [ { "vectorString": "8.0/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-250" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:1347", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087" }, { "name": "1040862", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040862" }, { "name": "RHSA-2018:1348", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "name": "DSA-4196", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4196" }, { "name": "RHSA-2018:1355", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "name": "RHSA-2018:1345", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "name": "https://access.redhat.com/security/vulnerabilities/pop_ss", "refsource": "MISC", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "name": "RHSA-2018:1318", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "name": "RHSA-2018:1524", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "name": "http://www.openwall.com/lists/oss-security/2018/05/08/5", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2018/05/08/5" }, { "name": "104127", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104127" }, { "name": "USN-3641-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3641-2/" }, { "name": "USN-3641-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3641-1/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1087" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087", "refsource": "CONFIRM", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087" }, { "name": "https://access.redhat.com/security/vulnerabilities/pop_ss", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "name": "http://www.openwall.com/lists/oss-security/2018/05/08/5", "refsource": "MISC", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2018/05/08/5" }, { "name": "DSA-4196", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4196" }, { "name": "USN-3641-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-2/" }, { "name": "RHSA-2018:1524", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "name": "RHSA-2018:1355", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "name": "RHSA-2018:1348", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "name": "RHSA-2018:1347", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "name": "RHSA-2018:1345", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "name": "RHSA-2018:1318", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "name": "1040862", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040862" }, { "name": "104127", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104127" }, { "name": "USN-3641-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-1/" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-09T23:38Z", "publishedDate": "2018-05-15T16:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.